Item Search

NameAudit NamePluginCategory
1.1 Ensure the Pre-Installation Planning Checklist Has Been ImplementedCIS Apache HTTP Server 2.4 v2.2.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 (L2) Ensure that only organizationally managed/approved public groups existCIS Microsoft 365 Foundations v5.0.0 L2 E3microsoft_azure

ACCESS CONTROL, MEDIA PROTECTION

1.2.1 (L2) Ensure that only organizationally managed/approved public groups existCIS Microsoft 365 Foundations v5.0.0 L2 E5microsoft_azure

ACCESS CONTROL, MEDIA PROTECTION

1.3.7 (L2) Ensure 'third-party storage services' are restricted in 'Microsoft 365 on the web'CIS Microsoft 365 Foundations v5.0.0 L2 E3microsoft_azure

ACCESS CONTROL, MEDIA PROTECTION

1.3.7 (L2) Ensure 'third-party storage services' are restricted in 'Microsoft 365 on the web'CIS Microsoft 365 Foundations v5.0.0 L2 E5microsoft_azure

ACCESS CONTROL, MEDIA PROTECTION

1.3.8 (L2) Ensure that Sways cannot be shared with people outside of your organizationCIS Microsoft 365 Foundations v5.0.0 L2 E5microsoft_azure

CONFIGURATION MANAGEMENT

1.3.8 (L2) Ensure that Sways cannot be shared with people outside of your organizationCIS Microsoft 365 Foundations v5.0.0 L2 E3microsoft_azure

CONFIGURATION MANAGEMENT

1.18 Ensure that all expired SSL/TLS certificates stored in AWS IAM are removedCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

3.3.1 (L1) Ensure Information Protection sensitivity label policies are publishedCIS Microsoft 365 Foundations v5.0.0 L1 E3microsoft_azure

RISK ASSESSMENT

3.3.1 (L1) Ensure Information Protection sensitivity label policies are publishedCIS Microsoft 365 Foundations v5.0.0 L1 E5microsoft_azure

RISK ASSESSMENT

5.1.6.1 (L2) Ensure that collaboration invitations are sent to allowed domains onlyCIS Microsoft 365 Foundations v5.0.0 L2 E5microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.1.6.1 (L2) Ensure that collaboration invitations are sent to allowed domains onlyCIS Microsoft 365 Foundations v5.0.0 L2 E3microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.1.6.3 (L2) Ensure guest user invitations are limited to the Guest Inviter roleCIS Microsoft 365 Foundations v5.0.0 L2 E3microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.1.6.3 (L2) Ensure guest user invitations are limited to the Guest Inviter roleCIS Microsoft 365 Foundations v5.0.0 L2 E5microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.5.3 (L2) Ensure additional storage providers are restricted in Outlook on the webCIS Microsoft 365 Foundations v5.0.0 L2 E3microsoft_azure

ACCESS CONTROL, MEDIA PROTECTION

6.5.3 (L2) Ensure additional storage providers are restricted in Outlook on the webCIS Microsoft 365 Foundations v5.0.0 L2 E5microsoft_azure

ACCESS CONTROL, MEDIA PROTECTION

18.7.1.1 (L2) Ensure 'Turn off notifications network usage' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L2 BitlockerWindows

CONFIGURATION MANAGEMENT, RISK ASSESSMENT

18.7.1.1 (L2) Ensure 'Turn off notifications network usage' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L2Windows

CONFIGURATION MANAGEMENT, RISK ASSESSMENT

CIS Control 13 (13.1) Maintain an Inventory of Sensitive InformationCAS Implementation Group 1 Audit FileUnix

CONFIGURATION MANAGEMENT